Hacker News new | past | comments | ask | show | jobs | submit login

The accessibility challenges are all the extra different failure modes HTTPS presents, such as client date offset, older devices, expired certificates, hostname mismatches, and many others.

Security is not the only priority in existence. Sometimes people just want to access the information. And when that is the case, HTTPS can be a huge impediment.




> Security is not the only priority in existence. Sometimes people just want to access the information. And when that is the case, HTTPS can be a huge impediment.

I suppose you'd be fine if your government started replacing the content of Wikipedia with their own propaganda/removing critical information about themselves from traffic?


So far they haven't. Meanwhile, millions of people with older devices cannot use them to access wikipedia.


you're aware that your government is already doing this, right ? (your argument is invalid)


how? Edits on Wikipedia are public, including historical monthly backups available over bt all the way back to 2006, and I can ensure Wikipedia servers are serving it correctly by cross-referencing that and the edits. With http, any ISP (whose operators all tend to favor government cooperation) or switch in the middle could sed content to remove or slightly alter known-critical content.


yeah... i havent gotten a good response why localhost should scream "insecure" or why i should wikipedia fail if my rtc clock is wonky.

i am not denying "security from snoops while paying with credit cards" and all that banking shit or messaging. heck, email is sent over the clear but we are told to use https to connect to the website (for webmails) using https for "security"...

sure sure security is all good and snazzy but i regularly come across websites who have had certs expired and the website makes it appear as if the sky will fall if i click on continue.

then we have ISPs who use DPI (my current ISP, reliance jio is doing it from day 1) so whats the point of pretending anyway?


> why localhost should scream "insecure"

Localhost, even with HTTP, is a secure context: https://developer.mozilla.org/en-US/docs/Web/Security/Secure...

What tool is screaming at you that localhost is insecure?


They may be using a self-signed cert so it’s https://localhost and the browser is flagging the cert rather than localhost itself.


browsers. padlock icon is crossed out


I just tested this and don't see that. I compared http://neverssl.com to running "python3 -m http.server" and visiting http://localhost:8000

* Chrome: "Not Secure" on neverssl, "i" in a circle on localhost

* Firefox: Padlock with a red line through it on neverssl, page icon on localhost

* Safari: "Not Secure" on neverssl, no message on localhost


> email is sent over the clear but we are told to use https to connect to the website (for webmails) using https for "security"

This is not true, most is encrypted in transit. It is not end to end, because your email service stores them (perhaps encrypted perhaps not).

Edit: https://transparencyreport.google.com/safer-email/overview?h...

You can see 84% of outbound is encrypted. This probably is generally a good proxy for the state of email tls transport.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: